SlideShare a Scribd company logo
1 of 27
KENDRIYA VIDYALAYA
NO- 1 SAGAR (CANTT.)
SUBJECT- COMPUTER
POWER POINT PRESENTATION

SUBMITTED TO MR. V. NEMA
INTERNET
INTROUCTION TO INTERNET
The internet is a network consisting of
thousands of small and large compute
networks. In other words internet can be
defined as a global network where
million of computers are connected to
each other.
All computers connected on the
net can exchange information by
following certain rules called Protocols.
Therefore a protocol is a set of rules
which the computers use to
communicate with one another across a
network.
SERVICIES POVIDED BY INTERNET
1- World Wide Web (www)
2- E-Mail (Electronic mail)

3- News group
4- Chat
5- Bulleting Board Service
6- Video Conferencing
7- File Transfer Protocol (FTP)
8- E-Commerce
9- Telnet
10- Hyper Text Transfer Protocol (HTTP)
Components required to connect to
Internet

1- A Computer System
2- A Modem
3- An Internet Service Provider (ISP)
connection
4- An Internet browsing software.
Modem
A modem is a computer device to connect
to and communicate with other computes
via a telephone line. Modem convents
digital signals to analog symbols, which is
known as Modulation and also converts the
analog signals to digital signals, known as
Demodulation. Hence the word Modem
comes from Modulator and Demodulator.

THERE ARE TWO TYPE OF MODEMS
AVAILABLE :1- Internal Modem
2- External Modem.
INTERNET SERVICE PROVIDER (ISP)
Internet Service Provides are companies
that provide the Internet connection against
charging some fee. ISPs use powerful
computes called Savers with high storage
capacity and memory, which is connected
with other savers through satellites all over
the world. The ISPs gives an account
number an password to its user to gain
access to the Internet.
When we want to use the internet,
you dial an get connected to an ISP. The
ISP then handles al the communication
between us and the Internet.
ISP IN INIDA
SOME OF THE ISPS IN INIDA ARE:-

• VSNL
• MTML
• Manta On-Line
• Satyam On-Line
WEB BOWSER
It is a software, which allows the user to
access and browse information on the
internet. Without a web browser internet
cannot be accessed. Internet Explorer,
Netscape Navigator, Opera an Mosaic are
common examples of web browses.
WEBSITE
A website is a collection of web pages which
give information about an organization, a
topic etc. A website can contain many
Hypertext links which link to a piece of text
or graphic that is like to some other text,
graphic, page or file.
TYPES OF WEBSITES :1- .com for Commercial Purposes like
Rediffmail.com
2- .org for Organizations like Congress.org
3- .edu for Educational Purposes like
imt.edu
4- .gov for Government like
inianraiways.gov.in
UNIFORM RESOURCE LOCATOR (URL)

URL provides an address to locate any site
on the Internet. Every website has got a
distinct URL. With the help of the URL, the
web site is retrieved by the Web Browser.
The URL helps the user to identify and
locate any resource on the Internet.
Search engines
Search Engine is a software that helps us to
locate Web Pages on the Internet that
contain information on the specified topics.
We can search for any topic, images, news,
video, meaning etc. using the search
engines.
SOME POPULAR SEARCH ENGINES
ARE:1- http.//google.com
2- http//khoj.com
3- http//yahoo.com
4- http// indiatimes.com

5- http//altavista.com
6- http// lycos.com etc.
Computer virus
COMPUTER VIRUS
A computer virus is a program intentionally
designed by a programmer for destroying
system files and data of other computers. A
virus program duplicates itself without any
instruction from the user and damages the
data on our disk by corrupting programs, or
even formatting the entire hard disk. In other
words we can say that virus simply
replicates. Virus corrupts or damages the
data without the knowledge of the user at a
very great speed.
How does virus infect a computer
system
Computer virus spread with the great speed
from one computer to another by means of
infected disks, networks, programs
downloaded from the Internet etc. a floppy
disk can also infect a computer. Some virus
programs are so well designed that they
have a pre-set date or time on which they
automatically. Virus can infect the display of
a file or keyboard or any program files as
word processor, database etc.
HOW DOES VIRUS SPREAD
Virus can easily spread from one system to
another by copying any infected application
on starting the computer system. This is
because the virus goes into the memory of
the computer and starts infecting each
application that gets executed by us. The
virus programs get transferred into a
computer through other virus infected
programs, which we copy from floppies,
CDs etc. examples of such viruses are
Michealangelo, Monkey etc.
Different types of virus:Boot virus
This type of virus infects the startup area of
the hard disk o floppy disk. They attach
themselves with the boot area and overwrite
on the original instructions and take up
control of the system. Booting means
stating the computer and loading the
operating system.
EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
PROGRAM VIRUS
This type of virus infect application
programs such as word processor,
database etc. When the infected fie is
executed, the virus gets activated and
remains present in the main memory
even when the execution of the file is
over. When you execute another fie,
the virus attaches itself to the new fie
and thus another file gets infected.
EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle
etc.
SYSTEM VIRUS

These viruses attach themselves to the
operating system and infect the input/output
unit of the operating system. They always
stay in the memory, damage parts of the
operating system and then destroy
themselves.
TROJAN HORSES AND WORMS

Trojan horses programs are those programs
that are useful to perform certain tasks. But
at the same time they damage files or data
in the system. This program destroys
Effects of virus
1- Viruses generally affect the software, files and folders of a
computer. Hardware components are generally immune to
viruses.
2- Fie with .exe extensions are soft targets to viruses.

3- Viruses can infect boot records thereby causing booting
problems.
4- Other effects of viruses include corruption of data files,
periodic hang- ups, slow system performance, loss of data
etc.
5- Viruses can also alter the contents and the size of a file.
6- It can change the al the files names to a signal name.
7- It can erase programs or data.
8- It can overwrite entire directories.
9- It can create bad sectors in files and therefore destroy
parts of the files
PRECAUTIONS
WE SHOULD
1- Scan all floppies using antivirus software.

2- Write protect the floppies before coping
data from other computer system.
3- Keep backup of all data and files.
4- Prepare an emergency boot disk.

5- Update your Antivirus program
periodically.
6- Restrict the use of your computer system
so that there is no unauthorized use.
We should not

1- Use floppies without scanning them
for possible viruses.
2- Run an unknown program without
using an antivirus to detect any viruses.
3- Allow everyone to use your computer
system.

4- While using Internet do not download
anything from the Internet without
scanning for viruses.
ANTIVIRUS SOFTWaRE
Antivirus is a software designed to
detect and remove viruses from the
computer system. Some types of virus
are difficult to remove. Antivirus program
gets activated whenever the computer
system is booted up.
IT DETECTES THE VIRUS AND
REMOVES IT. ANTIVIRUS PROGRAM
ARE OF TWO TYPES:1- SCANNERS
2:-ANTIDOTES
SCANNERS
Scanners are programs that scan the
disks to detect viruses. These programs
scan the disk for any known virus. After
scanning the disk and detecting the
virus, they inform the user about the
infected files. The user can then delete
the infected file or get it cleaned by an
Antidote.
ANTIDOTE
Antidote are programmed to detect virus
and clean the infected disk. Cleaning
involves deleting the virus code from the
infected file e.g. an Antidote detects virus in
the boot area of a computer system. It will
then delete the virus code and rewrite the
programs back in their proper place.

SOME POPULAR ANTIVIRUS
SOFTWARES ARE:1- Norton Antivirus
2- Guardian

3- Smart Dog
4- McAfee

etc.
MADE BY – PRANJAL MISHRA
CLASS – 7TH A
ROLL NO. - 7037

More Related Content

What's hot

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Virus09
Virus09Virus09
Virus09
defler
 

What's hot (20)

Malicious
MaliciousMalicious
Malicious
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Software security
Software securitySoftware security
Software security
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Mitppt
MitpptMitppt
Mitppt
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
computer security
computer securitycomputer security
computer security
 
Virus09
Virus09Virus09
Virus09
 

Viewers also liked

Parts of a computer (power point)
Parts of a computer (power point)Parts of a computer (power point)
Parts of a computer (power point)
Kanungnuch Chamnien
 
Computer 6 (power point presentation) copy
Computer 6 (power point presentation)   copyComputer 6 (power point presentation)   copy
Computer 6 (power point presentation) copy
Jade Fernandez
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 

Viewers also liked (15)

Parts of a computer (power point)
Parts of a computer (power point)Parts of a computer (power point)
Parts of a computer (power point)
 
Power Point Presentation
Power Point PresentationPower Point Presentation
Power Point Presentation
 
Good and bad power point presentation
Good and bad power point presentationGood and bad power point presentation
Good and bad power point presentation
 
Computer 6 (power point presentation) copy
Computer 6 (power point presentation)   copyComputer 6 (power point presentation)   copy
Computer 6 (power point presentation) copy
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networking
NetworkingNetworking
Networking
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Multimedia
MultimediaMultimedia
Multimedia
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Computer power point presentation

Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similar to Computer power point presentation (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
system Security
system Security system Security
system Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Computer power point presentation

  • 1. KENDRIYA VIDYALAYA NO- 1 SAGAR (CANTT.) SUBJECT- COMPUTER POWER POINT PRESENTATION SUBMITTED TO MR. V. NEMA
  • 3. INTROUCTION TO INTERNET The internet is a network consisting of thousands of small and large compute networks. In other words internet can be defined as a global network where million of computers are connected to each other. All computers connected on the net can exchange information by following certain rules called Protocols. Therefore a protocol is a set of rules which the computers use to communicate with one another across a network.
  • 4. SERVICIES POVIDED BY INTERNET 1- World Wide Web (www) 2- E-Mail (Electronic mail) 3- News group 4- Chat 5- Bulleting Board Service 6- Video Conferencing 7- File Transfer Protocol (FTP) 8- E-Commerce 9- Telnet 10- Hyper Text Transfer Protocol (HTTP)
  • 5. Components required to connect to Internet 1- A Computer System 2- A Modem 3- An Internet Service Provider (ISP) connection 4- An Internet browsing software.
  • 6. Modem A modem is a computer device to connect to and communicate with other computes via a telephone line. Modem convents digital signals to analog symbols, which is known as Modulation and also converts the analog signals to digital signals, known as Demodulation. Hence the word Modem comes from Modulator and Demodulator. THERE ARE TWO TYPE OF MODEMS AVAILABLE :1- Internal Modem 2- External Modem.
  • 7. INTERNET SERVICE PROVIDER (ISP) Internet Service Provides are companies that provide the Internet connection against charging some fee. ISPs use powerful computes called Savers with high storage capacity and memory, which is connected with other savers through satellites all over the world. The ISPs gives an account number an password to its user to gain access to the Internet. When we want to use the internet, you dial an get connected to an ISP. The ISP then handles al the communication between us and the Internet.
  • 8. ISP IN INIDA SOME OF THE ISPS IN INIDA ARE:- • VSNL • MTML • Manta On-Line • Satyam On-Line
  • 9. WEB BOWSER It is a software, which allows the user to access and browse information on the internet. Without a web browser internet cannot be accessed. Internet Explorer, Netscape Navigator, Opera an Mosaic are common examples of web browses.
  • 10. WEBSITE A website is a collection of web pages which give information about an organization, a topic etc. A website can contain many Hypertext links which link to a piece of text or graphic that is like to some other text, graphic, page or file. TYPES OF WEBSITES :1- .com for Commercial Purposes like Rediffmail.com 2- .org for Organizations like Congress.org 3- .edu for Educational Purposes like imt.edu 4- .gov for Government like inianraiways.gov.in
  • 11. UNIFORM RESOURCE LOCATOR (URL) URL provides an address to locate any site on the Internet. Every website has got a distinct URL. With the help of the URL, the web site is retrieved by the Web Browser. The URL helps the user to identify and locate any resource on the Internet.
  • 12. Search engines Search Engine is a software that helps us to locate Web Pages on the Internet that contain information on the specified topics. We can search for any topic, images, news, video, meaning etc. using the search engines. SOME POPULAR SEARCH ENGINES ARE:1- http.//google.com 2- http//khoj.com 3- http//yahoo.com 4- http// indiatimes.com 5- http//altavista.com 6- http// lycos.com etc.
  • 14. COMPUTER VIRUS A computer virus is a program intentionally designed by a programmer for destroying system files and data of other computers. A virus program duplicates itself without any instruction from the user and damages the data on our disk by corrupting programs, or even formatting the entire hard disk. In other words we can say that virus simply replicates. Virus corrupts or damages the data without the knowledge of the user at a very great speed.
  • 15. How does virus infect a computer system Computer virus spread with the great speed from one computer to another by means of infected disks, networks, programs downloaded from the Internet etc. a floppy disk can also infect a computer. Some virus programs are so well designed that they have a pre-set date or time on which they automatically. Virus can infect the display of a file or keyboard or any program files as word processor, database etc.
  • 16. HOW DOES VIRUS SPREAD Virus can easily spread from one system to another by copying any infected application on starting the computer system. This is because the virus goes into the memory of the computer and starts infecting each application that gets executed by us. The virus programs get transferred into a computer through other virus infected programs, which we copy from floppies, CDs etc. examples of such viruses are Michealangelo, Monkey etc.
  • 17. Different types of virus:Boot virus This type of virus infects the startup area of the hard disk o floppy disk. They attach themselves with the boot area and overwrite on the original instructions and take up control of the system. Booting means stating the computer and loading the operating system. EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
  • 18. PROGRAM VIRUS This type of virus infect application programs such as word processor, database etc. When the infected fie is executed, the virus gets activated and remains present in the main memory even when the execution of the file is over. When you execute another fie, the virus attaches itself to the new fie and thus another file gets infected. EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle etc.
  • 19. SYSTEM VIRUS These viruses attach themselves to the operating system and infect the input/output unit of the operating system. They always stay in the memory, damage parts of the operating system and then destroy themselves.
  • 20. TROJAN HORSES AND WORMS Trojan horses programs are those programs that are useful to perform certain tasks. But at the same time they damage files or data in the system. This program destroys
  • 21. Effects of virus 1- Viruses generally affect the software, files and folders of a computer. Hardware components are generally immune to viruses. 2- Fie with .exe extensions are soft targets to viruses. 3- Viruses can infect boot records thereby causing booting problems. 4- Other effects of viruses include corruption of data files, periodic hang- ups, slow system performance, loss of data etc. 5- Viruses can also alter the contents and the size of a file. 6- It can change the al the files names to a signal name. 7- It can erase programs or data. 8- It can overwrite entire directories. 9- It can create bad sectors in files and therefore destroy parts of the files
  • 22. PRECAUTIONS WE SHOULD 1- Scan all floppies using antivirus software. 2- Write protect the floppies before coping data from other computer system. 3- Keep backup of all data and files. 4- Prepare an emergency boot disk. 5- Update your Antivirus program periodically. 6- Restrict the use of your computer system so that there is no unauthorized use.
  • 23. We should not 1- Use floppies without scanning them for possible viruses. 2- Run an unknown program without using an antivirus to detect any viruses. 3- Allow everyone to use your computer system. 4- While using Internet do not download anything from the Internet without scanning for viruses.
  • 24. ANTIVIRUS SOFTWaRE Antivirus is a software designed to detect and remove viruses from the computer system. Some types of virus are difficult to remove. Antivirus program gets activated whenever the computer system is booted up. IT DETECTES THE VIRUS AND REMOVES IT. ANTIVIRUS PROGRAM ARE OF TWO TYPES:1- SCANNERS 2:-ANTIDOTES
  • 25. SCANNERS Scanners are programs that scan the disks to detect viruses. These programs scan the disk for any known virus. After scanning the disk and detecting the virus, they inform the user about the infected files. The user can then delete the infected file or get it cleaned by an Antidote.
  • 26. ANTIDOTE Antidote are programmed to detect virus and clean the infected disk. Cleaning involves deleting the virus code from the infected file e.g. an Antidote detects virus in the boot area of a computer system. It will then delete the virus code and rewrite the programs back in their proper place. SOME POPULAR ANTIVIRUS SOFTWARES ARE:1- Norton Antivirus 2- Guardian 3- Smart Dog 4- McAfee etc.
  • 27. MADE BY – PRANJAL MISHRA CLASS – 7TH A ROLL NO. - 7037